Static task
static1
Behavioral task
behavioral1
Sample
6c83416329ae63ed2e5f8c069f24bdd61a974a413a04281a614ae7e1d73844f2.exe
Resource
win7-20240729-en
General
-
Target
6c83416329ae63ed2e5f8c069f24bdd61a974a413a04281a614ae7e1d73844f2
-
Size
219KB
-
MD5
93bf45c72aa76e135f836d4d7f224196
-
SHA1
a51a4a57ba3a7e94b657563fd2cdd8585d28683b
-
SHA256
6c83416329ae63ed2e5f8c069f24bdd61a974a413a04281a614ae7e1d73844f2
-
SHA512
20e4a6f9e2bee312cca24d4fc4b8ab761410f92ec59ae922147666788bab72ab0911b904c57fefe533c69875fc8e97896b9161ac45d384d84ea81fa95d8fdd54
-
SSDEEP
6144:nXOAxKIiawQSu3IF9UtNRW9l1QAVzEAvv2OqsPa4HT0i4LFMEJf8Me5w6B:n0IiawQSu3IF9UtNRW9l1QAVzEU+OZ3D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6c83416329ae63ed2e5f8c069f24bdd61a974a413a04281a614ae7e1d73844f2
Files
-
6c83416329ae63ed2e5f8c069f24bdd61a974a413a04281a614ae7e1d73844f2.exe windows:5 windows x86 arch:x86
6f669e0f30d9c1149a0ac23bd6f297af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetCloseEnum
WNetEnumResourceA
WNetOpenEnumA
wsock32
connect
inet_addr
WSAStartup
ioctlsocket
htonl
select
WSAGetLastError
htons
ntohs
shutdown
setsockopt
WSACleanup
recv
bind
socket
closesocket
gethostbyname
send
listen
accept
gethostname
kernel32
GlobalFree
ResetEvent
CreateEventA
Sleep
LoadLibraryA
VirtualAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetProcAddress
CreateDirectoryA
GetCurrentProcess
CreateThread
CloseHandle
ReleaseMutex
CreateMutexA
WaitForSingleObject
SetEvent
GlobalAlloc
TerminateThread
GetExitCodeThread
user32
DestroyWindow
GetMessageA
RegisterClassExA
PostQuitMessage
LoadStringA
LoadIconA
TranslateMessage
CreateWindowExA
DefWindowProcA
SetWindowPos
DispatchMessageA
UpdateWindow
LoadCursorA
DialogBoxParamA
SetFocus
MessageBoxA
GetDlgItem
EndDialog
ShowWindow
GetDlgItemTextA
msvcr90
__CxxFrameHandler3
_CxxThrowException
memcpy
_controlfp_s
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
malloc
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_invoke_watson
memset
msvcp90
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?uncaught_exception@std@@YA_NXZ
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHPBDH@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 197KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ